As the number of internet connected devices grows, the attack surface and number of devices that can be leveraged to launch attacks continues to expand too. If it can be programmed, it can be hacked. This daunting reality facing our interconnected and digital environments has been described as a battle to be won every day by cyber security professionals. When you combine this with easy access to offensive cyber capabilities, such as ransomware or DDoS, it has allowed cyber criminals to have an impact disproportionate to their technical know-how and skill level.
- how has the threat landscape changed, and what can we do about it?
- How can we better manage attack complexity?
- Are we getting any better at validating an attack and containing it?
- Are we implementing controls quick enough?
- How can we stay ahead of emerging threats?
- Attacker Playbooks
- How behavioural analysis/ anomaly detection enables early threat identification
- Real world deployment scenarios